Application Security News and Articles


Discord Says 70,000 Users Had IDs Exposed in Recent Data Breach

The hackers claim the theft of over 2 million photos of government identification documents provided to Discord for age verification. The post Discord Says 70,000 Users Had IDs Exposed in Recent Data Breach appeared first on SecurityWeek.

When Your SaaS Feels Human at Scale

Discover how AI-driven communication brings empathy and personality to SaaS, helping automation feel more human, personal, and emotionally intelligent. The post When Your SaaS Feels Human at Scale appeared first on Security Boulevard.

Rethinking Security Data Management with AI-Native Pipelines 

AI-native security data pipelines transform security operations by using machine learning for adaptive filtering, automation, and 90% lower overhead. The post Rethinking Security Data Management with AI-Native Pipelines  appeared first on ...

Redis Lua Code Execution Vulnerability (CVE-2025-49844) Notice

Overview Recently, NSFOCUS CERT detected that Redis issued a security bulletin and fixed the Redis Lua code execution vulnerability (CVE-2025-49844); Because Redis’s Lua script engine has a use-after-free reuse vulnerability when handling ...

Researchers develop AI system to detect scam websites in search results

Scam websites tied to online shopping, pet sales, and other e-commerce schemes continue to cause millions in losses each year. Security tools can accurately detect fraudulent sites once they are found, but identifying new ones remains difficult. ...

Constella Intelligence Named a 2025 SINET16 Innovator by SINET

Recognized for excellence in identity risk intelligence, Constella joins elite cohort of cybersecurity disruptors. Constella Intelligence, a global leader in identity risk intelligence, is proud to announce that it has been selected as one of the ...

Behind the screens: Building security customers appreciate

In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and its commitment to protecting customer trust. Vachon explains how PRA Group balances identity verification with ...

Bots Are Evolving: Here’s How to Stop AI-Powered Automation Before It Stops You

Bots Are Evolving: Here’s How to Stop AI-Powered Automation Before It Stops You madhav Thu, 10/09/2025 - 04:34 More than half of all internet traffic is now automated. Bots don’t just scrape data or hoard inventory anymore. They mimic ...

Turning the human factor into your strongest cybersecurity defense

In this Help Net Security video, Jacob Martens, Field CISO at Upwind Security, explores one of cybersecurity’s most enduring challenges: the human factor behind breaches. Despite advances in technology, most attacks still begin with people, not ...

Outdated encryption leaves crypto wide open

The cryptocurrency sector faces an existential threat on two fronts: none of the 2,138 web applications and 146 mobile apps tested by ImmuniWeb support post-quantum encryption, and more than 7.8 million user records are already circulating on the ...

Six metrics policymakers need to track cyber resilience

Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to give governments a forward-looking picture of resilience. A new report ...

Zero Trust for AI Agents: Implementing Dynamic Authorization in an Autonomous World

Traditional role-based access control assumes predictable behavior, but AI agents exhibit emergent behaviors no human anticipated. Dynamic authorization using ABAC and JWT tokens enables real-time policy decisions that adapt to AI behavior, ...

Doing More With Less: What K-12 Tech Leaders Are Prioritizing for 2025–2026

Budget cuts, more devices than ever, and cyber threats that just won’t quit. That was the theme of our recent webinar, K-12 Cybersecurity on a Budget: Doing More With Less in the Age of Cuts, featuring three IT leaders who live this every day: ...

Exciting Developments in Cloud-Native Security

Are Machine Identities the Hidden Key to Cloud-Native Security? Effective cybersecurity strategies rely not only on safeguarding human credentials but also on ensuring the security of non-human identities (NHIs). These machine identities, often ...

The First Malicious MCP Server is a Warning Shot for AI Cybersecurity

  The first malicious Model Context Protocol (MCP) server has been discovered and we should all be worried how this is foreshadowing AI cybersecurity risks! Cybersecurity researchers at Koi Security detected malicious code within an MCP server ...

Unlocking the Future: What Android Screen Unlocking Reveals About Next-Gen IAM

Forgot your Android password, PIN, or pattern? Discover how Dr.Fone – Screen Unlock helps you regain access but also where Identity and Access Management (IAM) is headed. The post Unlocking the Future: What Android Screen Unlocking Reveals ...

News alert: Miggo Security lauded for preventing AI-borne attacks with behavior-aware security

TEL AVIV, Israel, Oct. 8, 2025, CyberNewswire — Miggo Security, pioneer and innovator in Application Detection & Response (ADR) and AI Runtime Defense, today announced it has been recognized as a Gartner Cool Vendor in AI Security. To … ...

USENIX 2025: PEPR ’25 – When Privacy Guarantees Meet Pre-Trained LLMs: A Case Study In Synthetic Data

Creators, Authors and Presenters: Yash Maurya and Aman Priyanshu, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. ...

Top 5 Hard-Earned Lessons from the Experts on Managing Kubernetes

Kubernetes has transformed how modern organizations deploy and operate scalable infrastructure, and the hype around automated cloud-native orchestration has made its adoption nearly ubiquitous over the past 10+ years. Yet behind the scenes, most ...

Randall Munroe’s XKCD ‘’Phase Changes”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Phase Changes” appeared first on Security Boulevard.